Programming Vehicles in Games
wassimulator.com
Why MIT Switched from Scheme to Python (2009)
wisdomandwonder.com
Up to date prices for LLM APIs all in one place
pricepertoken.com
Who has the fastest F1 website (2021)
jakearchibald.com
The sad state of font rendering on Linux
pandasauce.org
How to configure X11 in a simple way
eugene-andrienko.com
Implementing a Functional Language with Graph Reduction
thma.github.io
Show HN: The Montana MiniComputer
mtmc.cs.montana.edu
Show HN: A macOS clock that stays visible when coding or binging in fullscreen
cornertime.app
Nvidia Launches Family of Open Reasoning AI Models: OpenReasoning Nemotron
nvidianews.nvidia.com
Quantum Scientists Have Built a New Math of Cryptography
quantamagazine.org
Show HN: Apple Health MCP Server
github.com
Internet Archive Is Now a Federal Depository Library
kqed.org
Researchers value null results, but struggle to publish them
nature.com
Quantitative AI progress needs accurate and transparent evaluation
mathstodon.xyz
Steam, Itch.io Are Pulling 'Porn' Games. Critics Say It's a Slippery Slope
wired.com
Celebrating 20 Years of MDN
developer.mozilla.org
Women dating safety app 'Tea' breached, users' IDs posted to 4chan
404media.co
Games Look Bad: HDR and Tone Mapping
ventspace.wordpress.com
Reality is that a string of letters and numbers in plain text is all that’s required to grant someone full root access to your AWS (and many other cloud) provider’s existence even if all your stuff is disconnected from the internet.
Lots of best practices to mitigate the risk of that and blast radius of a comprise, but it’s a nasty anti-pattern in cloud security that bites hard when things go wrong. As the article highlights attackers are well positioned to exploit this and can take over your assets in seconds after an oops.